Explore the words cloud of the REACT project. It provides you a very rough idea of what is the project "REACT" about.
The following table provides information about the project.
Coordinator |
IDRYMA TECHNOLOGIAS KAI EREVNAS
Organization address contact info |
Coordinator Country | Greece [EL] |
Project website | http://react-h2020.eu/ |
Total cost | 2˙726˙461 € |
EC max contribution | 2˙726˙461 € (100%) |
Programme |
1. H2020-EU.3.7.4. (Improve cyber security) |
Code Call | H2020-DS-SC7-2017 |
Funding Scheme | RIA |
Starting year | 2018 |
Duration (year-month-day) | from 2018-06-01 to 2021-05-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | IDRYMA TECHNOLOGIAS KAI EREVNAS | EL (IRAKLEIO) | coordinator | 477˙500.00 |
2 | SYMANTEC (FRANCE) | FR (COURBEVOIE) | participant | 605˙750.00 |
3 | STICHTING VU | NL (AMSTERDAM) | participant | 520˙125.00 |
4 | RUHR-UNIVERSITAET BOCHUM | DE (BOCHUM) | participant | 409˙375.00 |
5 | EURECOM | FR (BIOT) | participant | 372˙461.00 |
6 | UNIVERSITY OF CYPRUS | CY (NICOSIA) | participant | 341˙250.00 |
Security is a vital property for every operational system and network. As systems become more powerful and, in many aspects, more complex, advanced cyber-attacks impose new threats for important operations of our society. Computer systems assist core functions of hospitals, energy centers, logistics, and communications, to name a few, and compromising such systems may have severe consequences for everyone of us. Despite the evolution of computer systems, current security defenses-although they have been substantially improved in the last decade-seem not really enough to stop advanced cyber attacks. Systems still suffer from vulnerabilities, despite the many active or passive defenses in place that have been developed in the last decades.
We believe that the core of this problem is that cyber attackers are almost always one step ahead of the cyber security researchers and practitioners. Indeed, cyber attackers are the first to strike, and while researchers try to figure out what happened, attackers have all the time in the world to plan their next strike. In this project we advocate that we should change the rules of the cyber attackers’ game and challenge the asymmetry. Instead of following the cyber attackers, researchers should try to forecast where attackers will strike next and to use this information (i) to fortify potential targets to withstand the attack and (ii) to wire targets up with forensic hooks and make them “forensics ready”. To make all this possible at a reasonable performance cost, we propose selective fortification, a mechanism that combines traditional passive and active defense approaches into a new reactive mode of operation. We take advantage of our rich background in software hardening and instrumentation for immediate delivering effective patches by selectively armoring the vulnerable part of a program.
Threat Model | Documents, reports | 2019-11-20 16:05:34 |
Initial Dissemination Plan | Documents, reports | 2019-11-20 16:05:34 |
Technology Requirements | Documents, reports | 2019-11-20 16:05:34 |
Website and collaboration tools | Websites, patent fillings, videos etc. | 2019-11-20 16:05:34 |
Take a look to the deliverables list in detail: detailed list of REACT deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2020 |
Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures published pages: , ISSN: , DOI: |
2020-01-29 | |
2020 |
Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi NetCAT: Practical Cache Attacks from the Network published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching published pages: , ISSN: , DOI: |
2019-11-20 | |
2018 |
Robert Gawlik, Thorsten Holz SoK: Make JIT-Spray Great Again published pages: , ISSN: , DOI: |
Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 18) | 2019-11-20 |
2018 |
tephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think published pages: , ISSN: , DOI: |
2019-11-20 | |
2018 |
Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida RIDL: Rogue In-Flight Data Load published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Constantinos Diomedous, Elias Athanasopoulos Practical Password Hardening based on TLS published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Kouwe, Erik van der, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida SoK: Benchmarking Flaws in Systems Security published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Österlund, Sebastian, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, and Cristiano Giuffrida KMVX: Detecting Kernel Information Leaks with Multi-Variant Execution published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos Cookie synchronization: Everything you always wanted to know but were afraid to ask published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis REAPER: Real-time App Analysis for Augmenting the Android Permission System published pages: , ISSN: , DOI: |
Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) | 2019-11-20 |
2019 |
Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos Markatos, Sotiris Ioannidis, Giorgos Vasiliadis Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz REDQUEEN: Fuzzing with Input-to-State Correspondence published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert NAUTILUS: Fishing for Deep Bugs with Grammars published pages: , ISSN: , DOI: |
Network and Distributed System Security Symposium (NDSS 2019) | 2019-11-20 |
2018 |
Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking published pages: , ISSN: , DOI: |
2019-11-20 | |
2019 |
Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks published pages: , ISSN: , DOI: |
2019-11-20 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "REACT" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "REACT" are provided by the European Opendata Portal: CORDIS opendata.